header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MP4 Converter 3.25.22 – ‘Name’ Denial of Service (PoC)

This exploit is a proof of concept for a denial of service vulnerability in MP4 Converter 3.25.22. The vulnerability is triggered when a user attempts to add a preset with a large name. The user must copy the text from the generated MP4Converter.txt file to clipboard, open MP4 Converter, select 'Options' > 'Video/Audio Formats', click 'Add Preset' and paste clipboard in the field 'Name', click 'OK' and click 'Reset All'. This will cause the application to crash.

PasteShr – SQL İnj.

Pasteshr is a script which allows users to store any text online for easy sharing. The vulnerability is a SQL injection which can be exploited by passing malicious payloads in the keyword parameter of the GET request. The attack pattern is '%27/**/RLIKE/**/(case/**/when/**//**/9494586=9494586/**/then/**/0x454d49524f474c55/**/else/**/0x28/**/end)/**/and/**/'%'='.

TwistedBrush Pro Studio 24.06 – ‘.srp’ Denial of Service (PoC)

TwistedBrush Pro Studio 24.06 is prone to a denial-of-service vulnerability when the application attempts to open a specially crafted '.srp' file. An attacker can exploit this vulnerability to crash the application, denying service to legitimate users.

TwistedBrush Pro Studio 24.06 – ‘Script Recorder’ Denial of Service (PoC)

TwistedBrush Pro Studio 24.06 is vulnerable to a denial of service attack when a specially crafted file is opened in the 'Script Recorder' feature. An attacker can create a file containing 500000 'A' characters and paste it into the 'Description' field of the 'Script Recorder' feature, which will cause the application to crash.

D-Link DWL-2600AP – (Authenticated) OS Command Injection (Restore Configuration)

The security vulnerability can be exploited by local authenticated attackers. There is no input validation on the POST Form Data Parameter 'configRestore' and the Form Data Parameter 'configServerip' (the input are passed directly to TFTP command) which allow attackers to execute arbitrary Operating System Commands on the device for malicious purposes. The attacker has to know the credentials in order to access the Panel.

SalesERP v.8.1 SQL Inj.

SalesERP v.8.1 is vulnerable to SQL Injection. Attackers can inject malicious SQL queries via the 'customer_id' and 'product_id' parameters in the POST request. The attack pattern used is '%27/**/oR/**/4803139=4803139/**/aNd/**/%276199%27=%276199'. This can be used to gain unauthorized access to the database.

Unauthenticated SQL Injection vulnerability

An SQL injection vulnerability has been identified in the web "activities API". An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if OpenProject is configured not to require authentication for API access.

Recent Exploits: